July 30, 2025

Recon1n

Caca

Are you looking for a tool to use during your recoinassance? Recon1n is here to help you! I have developed this script so that you don’t have to be searching for the right command to run while trying to extract valious data from your target.

Recon1n is a Bash Script suite design to identify potential vulnerabilities and attack vectors in a target system or network, having the posibility to anonymice your traffic in a very simple way. It’s very easy to use because the interaction with the program is done through a menu where you have up to 9 different actions to carry out.

You can download it from my GitHub repository.

Key Features

The tool has 9 different posibilities of use, which are divided into 2 categories:

  1. Anonymice
    • Change your MAC
    • Encrypt your traffic
  2. Recognition
    • Query DNS servers
    • Gather info about the domain propietary
    • Scan a network
    • Look for open ports in your target
    • Search for web subdirectories
    • Discover subdomains
    • Search vulnerabilities in a web server

Installation

Clone the Repository

Start by cloning the repository to your preferred directory:

git clone https://github.com/zw9seq/recon1n
cd recon1n

Install Dependencies

Next, grant execute privileges to the scripts and install the required dependencies using the setup.sh script:

chmod +x setup.sh
chmod +x recon1n
./setup.sh

Once the necessary packages are installed, you will need to configure the script to work properly.

Configuration

Open the script with your preferred text editor. For example:

nano recon1n

Then, modify the following lines:

small_list=""
medium_list=""
big_list=""

You need to specify the paths to your desired wordlists for subdirectory fuzzing. A comprehensive set of wordlists can be found here: [https://github.com/danielmiessler/SecLists].

Optional Configuration: Adding to System PATH

For easier execution, you can add the script to your system’s PATH. To check your current PATH, run:

echo $PATH

Typically, you’ll want to place the script in the /usr/local/bin directory. To do this, run:

sudo cp recon1n /usr/local/bin

This allows you to run the script from anywhere on your system without needing to navigate to the script’s directory.

How to use it

In order for the script to work properly you must run it as root.

menu